Sciweavers

8381 search results - page 67 / 1677
» The security of machine learning
Sort
View
94
Voted
BLISS
2009
IEEE
15 years 1 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
15 years 7 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
101
Voted
TSD
2010
Springer
14 years 10 months ago
A Priori and A Posteriori Machine Learning and Nonlinear Artificial Neural Networks
The main idea of a priori machine learning is to apply a machine learning method on a machine learning problem itself. We call it "a priori" because the processed data se...
Jan Zelinka, Jan Romportl, Ludek Müller
ALT
2010
Springer
15 years 2 months ago
Optimal Online Prediction in Adversarial Environments
: In many prediction problems, including those that arise in computer security and computational finance, the process generating the data is best modeled as an adversary with whom ...
Peter L. Bartlett
101
Voted
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 6 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...